US20070289012A1 - Remotely controllable security system - Google Patents

Remotely controllable security system Download PDF

Info

Publication number
US20070289012A1
US20070289012A1 US11/451,936 US45193606A US2007289012A1 US 20070289012 A1 US20070289012 A1 US 20070289012A1 US 45193606 A US45193606 A US 45193606A US 2007289012 A1 US2007289012 A1 US 2007289012A1
Authority
US
United States
Prior art keywords
computing device
mobile computing
server
security devices
physical security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/451,936
Inventor
Leemon Baird
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LEEMON BAIRD
BlueWave Security Inc
Original Assignee
BlueWave Security Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BlueWave Security Inc filed Critical BlueWave Security Inc
Priority to US11/451,936 priority Critical patent/US20070289012A1/en
Assigned to BLUEWAVE SECURITY, INC. reassignment BLUEWAVE SECURITY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BIARD, LEEMON
Publication of US20070289012A1 publication Critical patent/US20070289012A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • the present invention relates generally to the field of security systems and more particularly to a remotely controllable security system.
  • a number security systems have been proposed for residences. These systems commonly have a number of sensors to detect intrusion or a fire and alert a central alarm monitoring station. At the central alarm monitoring station operator decides whether to immediately call the authorities, contact the owners or contact the owners' emergency contact. These systems are not well suited for businesses, since they commonly only monitor several set alarm conditions. In addition, the response times are limited since the operators at the central alarm monitoring station are not normally familiar with your business or residence. There are more complex security systems that have multiple cameras that have to be monitored by security personnel. These security personnel are expensive to hire and it is difficult for anyone to constantly monitor multiple monitors.
  • a remotely controllable security system that overcomes these and other problems has a number of physical security devices, such as electronic door locks, closed circuit TV cameras, motion detectors, etc.
  • Control and monitoring software running on a server is coupled to each of the physical security devices and monitors and stores events.
  • streaming data can be saved and viewed from cameras and other devices.
  • a mobile computing device is capable of communicating with the server or directly over a wireless channel to the physical security devices. The mobile computing device can view streaming data from the cameras.
  • the mobile computing device has a cryptographic key for communicating with the server or with the physical security devices. When an alarm condition occurs, the mobile computing device is alerted and the user is present with a list of responses. The responses can include multiple actions, such as call the police and lock down all the doors. Because of the flexibility provided by the mobile computing device a central monitoring station or full time security personnel watching TV monitors is not required.
  • FIG. 1 is a block diagram of a remotely controllable security system in accordance with one embodiment of the invention
  • FIG. 2 is a block diagram of a remotely controllable security system in accordance with one embodiment of the invention.
  • FIG. 3 is a graphical depiction of the physical security devices in accordance with one embodiment of the invention.
  • FIG. 4 is a block diagram of the software running on a server in accordance with one embodiment of the invention.
  • FIG. 5 is a block diagram of the software running on a mobile computing device in accordance with one embodiment of the invention.
  • the invention is a remotely controllable security system that does not require a central alarm monitoring station and does not require expensive security personnel to watch camera monitors.
  • the system has three main components: a number of physical security devices, a control and monitoring software running on a server and a mobile computing device.
  • the physical security devices and the mobile computing device are capable of communicating over a wireless channel.
  • the physical security devices are electrically connected to wireless access points and can receive communications from the mobile computing device directly without going through the server.
  • FIG. 1 is a block diagram of a remotely controllable security system 10 in accordance with one embodiment of the invention.
  • the system 10 includes a server 12 that runs a control and monitoring software.
  • a personal digital assistant (PDA) 14 has a communication channel 16 to the server 12 .
  • a plurality of physical security devices 18 , 20 , 22 , 24 , 26 , 28 are in communication with the server 12 and may also communicate directly with the PDA 14 .
  • the physical security devices include a controllable door lock and keypad 18 , a door lock with proximity badge reader 20 , a camera 22 , a motion detector 24 , a RFID (radio frequency identification) reader 26 and other devices 28 .
  • the physical security devices can communicated over communication channels 30 , 32 , 34 , 36 , 38 , 40 , 42 , 44 to the server 12 or the PDA 14 .
  • the communication channels can be wired, wireless or both.
  • the other devices 28 may include condition detectors, such as those detecting when a window is opened or broken.
  • the monitoring and control software monitors all the physical security devices and keeps a record of all events related to each of the physical security devices. This includes recording video from the camera(s) 22 .
  • the monitoring and control software also controls these devices by sending a list of valid codes to the door lock keypad 18 .
  • the software also adds and removes authorized users from lists stored in the proximity badge reader 20 , RFID readers 26 , barcode reader, etc.
  • the control software can cause the cameras to move, zoom and turn on or off.
  • the control software may also lock down doors by refusing to open any doors until further notice.
  • the server many also provide a user interface through the web that allows users to view and control all the devices.
  • the mobile computing device may be a PDA, smart phone, laptop, etc.
  • the mobile computing device runs a web browser which can be used to control the server or special client software can be used to control the server.
  • the server can be used to setup connections between the mobile computing device and the physical computing devices, including streaming video from the camera to the mobile computing device.
  • FIG. 2 is a block diagram of a remotely controllable security system 50 in accordance with one embodiment of the invention.
  • the system 50 has a server 52 that runs a control and monitoring software 54 .
  • the server 52 has a communication channel 56 to a plurality of physical security devices (PSD) 58 , 60 , 62 .
  • PSD physical security devices
  • the physical security devices 58 , 60 , 62 each have a wireless interface (WI) 64 , 66 , 68 in one embodiment.
  • the server 52 also has a communication channel to a mobile computing device 70 .
  • the mobile computing device has a cryptographic key 72 , which is necessary to communicate with the server 52 .
  • the server 52 will also have a cryptographic key for secure communication.
  • the mobile computing device 70 includes a wireless interface (WI) 74 .
  • WI wireless interface
  • the WI 74 allows the mobile computing device to communicate directly with the PSDs 58 , 60 , 62 or to communicate through the a plurality of wireless access points (WAP) 76 , 78 , 80 .
  • the wireless access points 76 , 78 , 80 are hard wired to the server 52 although it is possible that they could communicate wirelessly with the server 52 .
  • the WAPs 76 , 78 , 80 are also hard wired to the PSDs 58 , 60 , 62 either directly or through the server 52 .
  • the mobile computing device 70 communicates with the server 52 , which communicates with the PSDs 58 , 60 , 62 . However, the mobile computing device 70 can communicate directly with the PSDs 58 , 60 , 62 when the server is down or there is an emergency.
  • the mobile computing device 70 runs a web browser that acts as a front end of the control and monitoring software 54 on the server 52 .
  • the server 52 is designed to be controlled through any machine that has a browser and the appropriate encryption software.
  • FIG. 3 is a graphical depiction of the physical security devices in accordance with one embodiment of the invention.
  • the physical security devices include motion detectors 90 , controllable doors 92 , keypad access panels for doors 94 , biometric readers 96 , closed circuit cameras 98 and event sensors such as a window sensor 100 . Any combination of these and other physical security devices may be used to protect a building from outside intruders, unauthorized access by employees or former employees and for fire detection.
  • FIG. 4 is a block diagram of the software running on a server in accordance with one embodiment of the invention.
  • a cryptography or encryption software 110 controls access to all the other software functions related to the security system.
  • the cryptographic system 110 is in communication with the monitoring system 112 .
  • the monitoring module 112 logs events associated with each of the physical security devices. The log includes date, time, type of event and device.
  • the monitoring module 112 may also log streaming data from a camera or other device. All events are logged for future analysis. The logging of events is used to determine unusual patterns of behavior by employees or contractors.
  • the control module 114 manages the lists of valid codes for keypads and lists of valid biometrics. This is useful in denying access to former employees, employees that have been assigned to new projects and employees that have been demoted.
  • the control module 114 also includes a list of authorized users for various devices, commands cameras to pan/zoom or turn to a new view.
  • the control module controls door locks. This allows the control module to lock all doors in case of an unauthorized access. Alternatively, it allows the system to unlock all the doors in the case of a fire.
  • the server also has a user interface 116 that allows web access by remote users.
  • FIG. 5 is a block diagram of the software running on a mobile computing device in accordance with one embodiment of the invention.
  • a web browser 120 is used to access most of the functions on the mobile computing device.
  • the web browser 120 is coupled to a communication interface 122 for communication with external devices.
  • the communication interface includes a cryptographic key and encryption system that is necessary, in some embodiments, to access the server or physical security devices.
  • the communication interface 122 also includes a password access module, that requires the user to enter a password and/or provide a biometric parameter (fingerprint, handwriting recognition, etc) before the user is allowed access to the security system functions.
  • the mobile computing device has a similar set of monitoring 124 and control 126 software modules.
  • the monitoring module 124 is capable of receiving streaming data 128 from a camera or other physical security device.
  • the monitoring module 124 may also receive alerts 128 .
  • the monitoring module 124 may receive an alert when an incorrect code is entered into a door keypad or when two incorrect key codes are entered consecutively.
  • an alert may be received when the RFID reader data is inconsistent with the code entered into the door keypad. This may result in the control module 126 bring up a number of emergency options.
  • These emergency options are preprogrammed into the mobile computing device.
  • the emergency options may include a lock down feature where all the controllable locks are set to a lock condition. Another option may be to notify the police or the fire department. Alternatively, an alert may cause a camera's data to be streamed to the mobile computing device for evaluation.
  • the mobile computing device may also receive an alert when a certain set of doors are opened or remain open for a period of time or when a motion detector(s) detects a certain group of motions. The user may be notified of the alert by the mobile computing device having an audible alarm or a vibration.
  • the control module 126 may also have a number preset functions, such as night operation, weekend operation, vacation operation or high security operation, fire detected operations, intruder operations, etc.
  • the control module 126 can change the memory of the physical security device by removing a newly-fired employee from the list of authorized PIN numbers in a keypad door lock. The control module 126 will store the change in its memory and upload the information to the server.
  • the server when next available will poll the physical security devices for changes. If it notes a change it will record the change and alert other users of the change. This allows the users to immediately know if an attacker has used a mobile computing device in emergency mode to change the memory of these devices.
  • the password module can also require a smart card or other device be inserted into the mobile computing device to authenticate the user.
  • the mobile computing device can be controlled using voice recognition.
  • the mobile computing device has the ability to implement macros to cause a series of actions to occur. An example is the lock down feature.
  • the multiple WAP 76 , 78 , 80 may be used to triangulate (or use some other location algorithm) the location of mobile computing devices 70 .
  • the RFID readers may also be used to determine the location of people or mobile computing devices. This information may be viewed by authorized personnel to locate all the devices or to determine the location of a mobile computing device that entered a bad password. In addition, the authorized personnel can locate employees nearest an alert event and communicate with them to investigate or take other action. Also by logging the location of the mobile computing devices and other events this information can be used to identify attackers on the security system.

Abstract

A remotely controllable security system has a number of physical security devices, such as electronic door locks, closed circuit TV cameras, motion detector, etc. Control and monitoring software running on a server is coupled to each of the physical security devices and monitors and stores events. In addition, streaming data can be saved and viewed from cameras and other devices. A mobile computing device is capable of communicating with the server or directly over a wireless channel to the physical security devices. The mobile computing device can view streaming data from the cameras.

Description

    RELATED APPLICATIONS
  • None
  • FIELD OF THE INVENTION
  • The present invention relates generally to the field of security systems and more particularly to a remotely controllable security system.
  • BACKGROUND OF THE INVENTION
  • A number security systems have been proposed for residences. These systems commonly have a number of sensors to detect intrusion or a fire and alert a central alarm monitoring station. At the central alarm monitoring station operator decides whether to immediately call the authorities, contact the owners or contact the owners' emergency contact. These systems are not well suited for businesses, since they commonly only monitor several set alarm conditions. In addition, the response times are limited since the operators at the central alarm monitoring station are not normally familiar with your business or residence. There are more complex security systems that have multiple cameras that have to be monitored by security personnel. These security personnel are expensive to hire and it is difficult for anyone to constantly monitor multiple monitors.
  • Thus, there exists a need for a security system that does not require expensive security personnel or a central alarm monitoring station.
  • SUMMARY OF INVENTION
  • A remotely controllable security system that overcomes these and other problems has a number of physical security devices, such as electronic door locks, closed circuit TV cameras, motion detectors, etc. Control and monitoring software running on a server is coupled to each of the physical security devices and monitors and stores events. In addition, streaming data can be saved and viewed from cameras and other devices. A mobile computing device is capable of communicating with the server or directly over a wireless channel to the physical security devices. The mobile computing device can view streaming data from the cameras. The mobile computing device has a cryptographic key for communicating with the server or with the physical security devices. When an alarm condition occurs, the mobile computing device is alerted and the user is present with a list of responses. The responses can include multiple actions, such as call the police and lock down all the doors. Because of the flexibility provided by the mobile computing device a central monitoring station or full time security personnel watching TV monitors is not required.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of a remotely controllable security system in accordance with one embodiment of the invention;
  • FIG. 2 is a block diagram of a remotely controllable security system in accordance with one embodiment of the invention;
  • FIG. 3 is a graphical depiction of the physical security devices in accordance with one embodiment of the invention;
  • FIG. 4 is a block diagram of the software running on a server in accordance with one embodiment of the invention; and
  • FIG. 5 is a block diagram of the software running on a mobile computing device in accordance with one embodiment of the invention.
  • DETAILED DESCRIPTION OF THE DRAWINGS
  • The invention is a remotely controllable security system that does not require a central alarm monitoring station and does not require expensive security personnel to watch camera monitors. The system has three main components: a number of physical security devices, a control and monitoring software running on a server and a mobile computing device. The physical security devices and the mobile computing device are capable of communicating over a wireless channel. In one embodiment, the physical security devices are electrically connected to wireless access points and can receive communications from the mobile computing device directly without going through the server.
  • FIG. 1 is a block diagram of a remotely controllable security system 10 in accordance with one embodiment of the invention. The system 10 includes a server 12 that runs a control and monitoring software. A personal digital assistant (PDA) 14 has a communication channel 16 to the server 12. A plurality of physical security devices 18, 20, 22, 24, 26, 28 are in communication with the server 12 and may also communicate directly with the PDA 14. The physical security devices include a controllable door lock and keypad 18, a door lock with proximity badge reader 20, a camera 22, a motion detector 24, a RFID (radio frequency identification) reader 26 and other devices 28. The physical security devices can communicated over communication channels 30, 32, 34, 36, 38, 40, 42, 44 to the server 12 or the PDA 14. The communication channels can be wired, wireless or both. The other devices 28 may include condition detectors, such as those detecting when a window is opened or broken. The monitoring and control software monitors all the physical security devices and keeps a record of all events related to each of the physical security devices. This includes recording video from the camera(s) 22. The monitoring and control software also controls these devices by sending a list of valid codes to the door lock keypad 18. The software also adds and removes authorized users from lists stored in the proximity badge reader 20, RFID readers 26, barcode reader, etc. The control software can cause the cameras to move, zoom and turn on or off. The control software may also lock down doors by refusing to open any doors until further notice. The server many also provide a user interface through the web that allows users to view and control all the devices. The mobile computing device may be a PDA, smart phone, laptop, etc. The mobile computing device runs a web browser which can be used to control the server or special client software can be used to control the server. The server can be used to setup connections between the mobile computing device and the physical computing devices, including streaming video from the camera to the mobile computing device.
  • FIG. 2 is a block diagram of a remotely controllable security system 50 in accordance with one embodiment of the invention. The system 50 has a server 52 that runs a control and monitoring software 54. The server 52 has a communication channel 56 to a plurality of physical security devices (PSD) 58, 60, 62. The physical security devices 58, 60, 62 each have a wireless interface (WI) 64, 66, 68 in one embodiment. The server 52 also has a communication channel to a mobile computing device 70. The mobile computing device has a cryptographic key 72, which is necessary to communicate with the server 52. The server 52 will also have a cryptographic key for secure communication. The mobile computing device 70 includes a wireless interface (WI) 74. The WI 74 allows the mobile computing device to communicate directly with the PSDs 58, 60, 62 or to communicate through the a plurality of wireless access points (WAP) 76, 78, 80. The wireless access points 76, 78, 80 are hard wired to the server 52 although it is possible that they could communicate wirelessly with the server 52. The WAPs 76, 78, 80 are also hard wired to the PSDs 58, 60, 62 either directly or through the server 52.
  • Normally, the mobile computing device 70 communicates with the server 52, which communicates with the PSDs 58, 60, 62. However, the mobile computing device 70 can communicate directly with the PSDs 58, 60, 62 when the server is down or there is an emergency. The mobile computing device 70 runs a web browser that acts as a front end of the control and monitoring software 54 on the server 52. The server 52 is designed to be controlled through any machine that has a browser and the appropriate encryption software.
  • FIG. 3 is a graphical depiction of the physical security devices in accordance with one embodiment of the invention. The physical security devices include motion detectors 90, controllable doors 92, keypad access panels for doors 94, biometric readers 96, closed circuit cameras 98 and event sensors such as a window sensor 100. Any combination of these and other physical security devices may be used to protect a building from outside intruders, unauthorized access by employees or former employees and for fire detection.
  • FIG. 4 is a block diagram of the software running on a server in accordance with one embodiment of the invention. A cryptography or encryption software 110 controls access to all the other software functions related to the security system. The cryptographic system 110 is in communication with the monitoring system 112. The monitoring module 112 logs events associated with each of the physical security devices. The log includes date, time, type of event and device. The monitoring module 112 may also log streaming data from a camera or other device. All events are logged for future analysis. The logging of events is used to determine unusual patterns of behavior by employees or contractors. The control module 114 manages the lists of valid codes for keypads and lists of valid biometrics. This is useful in denying access to former employees, employees that have been assigned to new projects and employees that have been demoted. This function is accessible from the mobile computing device so that there is minimal lag time between the change in an employee's status and their access to sensitive areas of the building. The control module 114 also includes a list of authorized users for various devices, commands cameras to pan/zoom or turn to a new view. The control module controls door locks. This allows the control module to lock all doors in case of an unauthorized access. Alternatively, it allows the system to unlock all the doors in the case of a fire. The server also has a user interface 116 that allows web access by remote users.
  • FIG. 5 is a block diagram of the software running on a mobile computing device in accordance with one embodiment of the invention. A web browser 120 is used to access most of the functions on the mobile computing device. The web browser 120 is coupled to a communication interface 122 for communication with external devices. The communication interface includes a cryptographic key and encryption system that is necessary, in some embodiments, to access the server or physical security devices. The communication interface 122 also includes a password access module, that requires the user to enter a password and/or provide a biometric parameter (fingerprint, handwriting recognition, etc) before the user is allowed access to the security system functions. The mobile computing device has a similar set of monitoring 124 and control 126 software modules. The monitoring module 124 is capable of receiving streaming data 128 from a camera or other physical security device. The monitoring module 124 may also receive alerts 128. For instance, the monitoring module 124 may receive an alert when an incorrect code is entered into a door keypad or when two incorrect key codes are entered consecutively. Alternatively, an alert may be received when the RFID reader data is inconsistent with the code entered into the door keypad. This may result in the control module 126 bring up a number of emergency options. These emergency options are preprogrammed into the mobile computing device. The emergency options may include a lock down feature where all the controllable locks are set to a lock condition. Another option may be to notify the police or the fire department. Alternatively, an alert may cause a camera's data to be streamed to the mobile computing device for evaluation.
  • The mobile computing device may also receive an alert when a certain set of doors are opened or remain open for a period of time or when a motion detector(s) detects a certain group of motions. The user may be notified of the alert by the mobile computing device having an audible alarm or a vibration. The control module 126 may also have a number preset functions, such as night operation, weekend operation, vacation operation or high security operation, fire detected operations, intruder operations, etc. The control module 126 can change the memory of the physical security device by removing a newly-fired employee from the list of authorized PIN numbers in a keypad door lock. The control module 126 will store the change in its memory and upload the information to the server. If the mobile computing device is accidentally destroyed before communicating with the server, then the server when next available will poll the physical security devices for changes. If it notes a change it will record the change and alert other users of the change. This allows the users to immediately know if an attacker has used a mobile computing device in emergency mode to change the memory of these devices. The password module can also require a smart card or other device be inserted into the mobile computing device to authenticate the user. In one embodiment, the mobile computing device can be controlled using voice recognition. The mobile computing device has the ability to implement macros to cause a series of actions to occur. An example is the lock down feature.
  • In one embodiment, the multiple WAP 76, 78, 80 may be used to triangulate (or use some other location algorithm) the location of mobile computing devices 70. In one embodiment, the RFID readers may also be used to determine the location of people or mobile computing devices. This information may be viewed by authorized personnel to locate all the devices or to determine the location of a mobile computing device that entered a bad password. In addition, the authorized personnel can locate employees nearest an alert event and communicate with them to investigate or take other action. Also by logging the location of the mobile computing devices and other events this information can be used to identify attackers on the security system.
  • Thus there has been described a remotely controllable security that does not require expensive security personnel or a central alarm monitoring station.
  • While the invention has been described in conjunction with specific embodiments thereof, it is evident that many alterations, modifications, and variations will be apparent to those skilled in the art in light of the foregoing description. Accordingly, it is intended to embrace all such alterations, modifications, and variations in the appended claims.

Claims (20)

1. A remotely controllable security system comprising:
a plurality of physical security devices each having a wireless interface;
a server coupled to each of the plurality of physical security devices having a control and monitoring software that tracks events related to each of the plurality of physical security devices; and
a mobile computing device having a wireless interface and capable of communicating directly with each of the plurality of physical security devices, the mobile computing device having a cryptographic key necessary for communicating with the server.
2. The system of claim 1, wherein the plurality of physical security devices includes a keypad for a door and the server manages a list of authorized users.
3. The system of claim 1, wherein the plurality of physical security devices include a controllable door lock and the mobile computing device includes a lock down feature.
4. The system of claim 1, wherein the mobile computing device receives streaming data from one of the plurality of physical devices through the server.
5. The system of claim 1, wherein the mobile computing device includes a list of emergency responses.
6. The system of claim 5, wherein the list of emergency responses includes transmitting a message to at least one of the physical security devices to change its state.
7. The system of claim 1, wherein the mobile computing device has a security software module that has a password access feature.
8. A remotely controllable security system, comprising:
a plurality of physical security devices at least one of which has a wireless interface;
a control and monitoring software tracking events related to each of the plurality of physical security devices; and
a mobile computing device having a wireless interface, the mobile computing device having a quick list of emergency responses.
9. The system of claim 8, wherein the list of emergency responses includes a lock down feature.
10. The system of claim 9, wherein the lock down feature includes directly transmitting a message to one of the physical security devices to change its state.
11. The system of claim 10, wherein the mobile computing device has a cryptographic key necessary for communicating with the one of the physical security devices.
12. The system of claim 8, wherein the mobile computing device receives a streaming data from one of the plurality of physical devices through the server.
13. The system of claim 11, wherein the mobile computing device has a password access feature.
14. A remotely controllable security system comprising:
a plurality of physical devices;
a server coupled to the plurality of physical security devices;
a plurality of wireless access points; and
a mobile computing device that has a communication channel through one of the plurality of wireless access points to the server.
15. The system of claim 14, wherein the server has a locate mobile computing device function that uses a signal between a subset of the plurality of wireless access points and the mobile computing device to locate the mobile computing device.
16. The system of claim 14, wherein the mobile computing device receives an alert when an incorrect code is entered into one of the plurality of physical security devices.
17. The system of claim 14, wherein the mobile computing device has a list of emergency responses.
18. The system of claim 17, wherein the list of emergency responses includes a lock down feature.
19. The system of claim 18, wherein the lock down feature transmits a message to one of the plurality of physical devices to change its state.
20. The system of claim 14, wherein the mobile computing device has a cryptographic key necessary for communicating with the server.
US11/451,936 2006-06-13 2006-06-13 Remotely controllable security system Abandoned US20070289012A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/451,936 US20070289012A1 (en) 2006-06-13 2006-06-13 Remotely controllable security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/451,936 US20070289012A1 (en) 2006-06-13 2006-06-13 Remotely controllable security system

Publications (1)

Publication Number Publication Date
US20070289012A1 true US20070289012A1 (en) 2007-12-13

Family

ID=38823479

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/451,936 Abandoned US20070289012A1 (en) 2006-06-13 2006-06-13 Remotely controllable security system

Country Status (1)

Country Link
US (1) US20070289012A1 (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070266428A1 (en) * 2006-03-06 2007-11-15 James Downes Method, System, And Apparatus For Nested Security Access/Authentication
US20080151050A1 (en) * 2006-12-20 2008-06-26 Self Michael R Enhanced Multimedia Intrusion Notification System and Method
US20090164467A1 (en) * 2007-12-20 2009-06-25 Nokia Corporation Ice recognition function to override mobile device lock code
US20090164519A1 (en) * 2007-12-20 2009-06-25 Nokia Corporation Handling, management and creation of ice contacts
US20090165511A1 (en) * 2007-12-29 2009-07-02 International Business Machines Corporation Monitoring access to controlled areas using electronic monitors
US20090300717A1 (en) * 2008-06-03 2009-12-03 Ca, Inc. Hardware access and monitoring control
US20100283579A1 (en) * 2007-12-31 2010-11-11 Schlage Lock Company Method and system for remotely controlling access to an access point
WO2012064263A1 (en) * 2010-11-09 2012-05-18 Zaplox Ab Method and system for remote operation of an installation
WO2012116037A1 (en) * 2011-02-22 2012-08-30 Stanley Security Solutions, Inc. Wireless lock with lockdown
US20120306613A1 (en) * 2011-06-02 2012-12-06 Nokia Siemens Networks Oy Sensor allocation
US20130008213A1 (en) * 2008-06-27 2013-01-10 Schlage Lock Company Llc Electronic door with key-in-lever feature
US8836790B1 (en) * 2013-05-09 2014-09-16 Remote Monitoring Systems, LLC Remote monitoring system for tanks
US20150187151A1 (en) * 2012-07-27 2015-07-02 Assa Abloy Ab Systems and methods for controlling in-room safes with nfc-enabled devices
US20150207971A1 (en) * 2014-01-22 2015-07-23 Panasonic Intellectual Property Management Co., Ltd. Monitoring apparatus for controlling operation of shutter
CN104932284A (en) * 2014-02-06 2015-09-23 霍尼韦尔国际公司 Method and system of interacting with building security systems
WO2016095623A1 (en) * 2014-12-19 2016-06-23 小米科技有限责任公司 Method and apparatus for processing surveillance video
US9538380B2 (en) * 2015-06-03 2017-01-03 I-Ting Shen Control system cooperating with a mobile device and a management server
US20170011573A1 (en) * 2015-07-06 2017-01-12 Acsys Ip Holding Inc. Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons
US9552491B1 (en) * 2007-12-04 2017-01-24 Crimson Corporation Systems and methods for securing data
US9589404B2 (en) * 2015-06-05 2017-03-07 Ford Global Technologies, Llc Method and apparatus for remote vehicle keypad enablement and disablement
US20170078260A1 (en) * 2015-09-11 2017-03-16 I-Ting Shen Control System Operable by Mobile Devices
FR3043118A1 (en) * 2015-10-29 2017-05-05 K Line SYSTEM FOR STEERING A DOOR HAVING A CREMONE LOCK COMMANDABLE BY AN ELECTRIC ACTUATOR
US9754432B2 (en) * 2015-11-17 2017-09-05 International Business Machines Corporation Wireless communication protocol based lock management
WO2017172871A1 (en) * 2016-03-31 2017-10-05 Spectrum Brands, Inc. Locking device with multiple authentication devices
US10606290B2 (en) 2012-07-27 2020-03-31 Assa Abloy Ab Controlling an operating condition of a thermostat
US11079755B2 (en) 2019-04-05 2021-08-03 Equipmentshare.Com Inc. System and method for autonomous operation of a machine
US11127410B2 (en) * 2019-11-12 2021-09-21 Wen-Ta Chiu Voice decoding device and method thereof
US20210343098A1 (en) * 2016-09-21 2021-11-04 Equipmentshare.Com Inc Method, system and apparatus for equipment monitoring and access control
US20220392285A1 (en) * 2021-06-08 2022-12-08 Carrier Corporation Monitoring items in an area accessible through an electronic locking device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5321242A (en) * 1991-12-09 1994-06-14 Brinks, Incorporated Apparatus and method for controlled access to a secured location
US6075860A (en) * 1997-02-19 2000-06-13 3Com Corporation Apparatus and method for authentication and encryption of a remote terminal over a wireless link
US6559769B2 (en) * 2001-10-01 2003-05-06 Eric Anthony Early warning real-time security system
US20050237187A1 (en) * 2004-04-09 2005-10-27 Martin Sharon A H Real-time security alert & connectivity system for real-time capable wireless cellphones and palm/hand-held wireless apparatus
US6970183B1 (en) * 2000-06-14 2005-11-29 E-Watch, Inc. Multimedia surveillance and monitoring system including network configuration
US20060104600A1 (en) * 2004-11-12 2006-05-18 Sfx Entertainment, Inc. Live concert/event video system and method
US7113090B1 (en) * 2001-04-24 2006-09-26 Alarm.Com Incorporated System and method for connecting security systems to a wireless device
US20060250578A1 (en) * 2005-05-06 2006-11-09 Pohl Garrick G Systems and methods for controlling, monitoring, and using remote applications
US7183907B2 (en) * 2004-10-20 2007-02-27 Honeywell International, Inc. Central station monitoring with real-time status and control
US7218930B2 (en) * 2003-07-31 2007-05-15 Acer Incorporated Automatic recognition system for use in a wireless local area network (LAN)

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5321242A (en) * 1991-12-09 1994-06-14 Brinks, Incorporated Apparatus and method for controlled access to a secured location
US6075860A (en) * 1997-02-19 2000-06-13 3Com Corporation Apparatus and method for authentication and encryption of a remote terminal over a wireless link
US6970183B1 (en) * 2000-06-14 2005-11-29 E-Watch, Inc. Multimedia surveillance and monitoring system including network configuration
US7113090B1 (en) * 2001-04-24 2006-09-26 Alarm.Com Incorporated System and method for connecting security systems to a wireless device
US6559769B2 (en) * 2001-10-01 2003-05-06 Eric Anthony Early warning real-time security system
US7218930B2 (en) * 2003-07-31 2007-05-15 Acer Incorporated Automatic recognition system for use in a wireless local area network (LAN)
US20050237187A1 (en) * 2004-04-09 2005-10-27 Martin Sharon A H Real-time security alert & connectivity system for real-time capable wireless cellphones and palm/hand-held wireless apparatus
US7183907B2 (en) * 2004-10-20 2007-02-27 Honeywell International, Inc. Central station monitoring with real-time status and control
US20060104600A1 (en) * 2004-11-12 2006-05-18 Sfx Entertainment, Inc. Live concert/event video system and method
US20060250578A1 (en) * 2005-05-06 2006-11-09 Pohl Garrick G Systems and methods for controlling, monitoring, and using remote applications

Cited By (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070266428A1 (en) * 2006-03-06 2007-11-15 James Downes Method, System, And Apparatus For Nested Security Access/Authentication
US20080151050A1 (en) * 2006-12-20 2008-06-26 Self Michael R Enhanced Multimedia Intrusion Notification System and Method
US9552491B1 (en) * 2007-12-04 2017-01-24 Crimson Corporation Systems and methods for securing data
US20090164467A1 (en) * 2007-12-20 2009-06-25 Nokia Corporation Ice recognition function to override mobile device lock code
US20090164519A1 (en) * 2007-12-20 2009-06-25 Nokia Corporation Handling, management and creation of ice contacts
US8775430B2 (en) 2007-12-20 2014-07-08 Core Wireless Licensing S.A.R.L. Handling, management and creation of ice contacts
US8301630B2 (en) 2007-12-20 2012-10-30 Core Wireless Licensing S.A.R.L. Handling, management and creation of ice contacts
US20090165511A1 (en) * 2007-12-29 2009-07-02 International Business Machines Corporation Monitoring access to controlled areas using electronic monitors
US7994925B2 (en) * 2007-12-29 2011-08-09 International Business Machines Corporation Monitoring access to controlled areas using electronic monitors
US8331544B2 (en) * 2007-12-31 2012-12-11 Schlage Lock Company, Llc Method and system for remotely controlling access to an access point
US20100283579A1 (en) * 2007-12-31 2010-11-11 Schlage Lock Company Method and system for remotely controlling access to an access point
US20090300717A1 (en) * 2008-06-03 2009-12-03 Ca, Inc. Hardware access and monitoring control
US8341729B2 (en) * 2008-06-03 2012-12-25 Ca, Inc. Hardware access and monitoring control
US8819858B2 (en) 2008-06-03 2014-08-26 Ca, Inc. Hardware access and monitoring control
US20210164263A1 (en) * 2008-06-27 2021-06-03 Schlage Lock Company Llc Electronic door with key-in-lever feature
US20130008213A1 (en) * 2008-06-27 2013-01-10 Schlage Lock Company Llc Electronic door with key-in-lever feature
US10801235B2 (en) 2008-06-27 2020-10-13 Schlage Lock Company Llc Electronic door with key-in-lever feature
US11739561B2 (en) * 2008-06-27 2023-08-29 Schlage Lock Company Llc Electronic door with key-in-lever feature
US20170241164A1 (en) * 2008-06-27 2017-08-24 Schlage Lock Company Electronic door with key-in-lever feature
WO2012064263A1 (en) * 2010-11-09 2012-05-18 Zaplox Ab Method and system for remote operation of an installation
US9083698B2 (en) 2010-11-09 2015-07-14 Zablox AB Method and system for remote operation of an installation
AU2017202802B2 (en) * 2011-02-22 2019-02-14 Dormakaba Usa Inc. Wireless lock with lockdown
WO2012116037A1 (en) * 2011-02-22 2012-08-30 Stanley Security Solutions, Inc. Wireless lock with lockdown
CN103547754A (en) * 2011-02-22 2014-01-29 斯坦利安全解决方案股份有限公司 Wireless lock with lockdown
US20120306613A1 (en) * 2011-06-02 2012-12-06 Nokia Siemens Networks Oy Sensor allocation
US20150187151A1 (en) * 2012-07-27 2015-07-02 Assa Abloy Ab Systems and methods for controlling in-room safes with nfc-enabled devices
US10606290B2 (en) 2012-07-27 2020-03-31 Assa Abloy Ab Controlling an operating condition of a thermostat
US8836790B1 (en) * 2013-05-09 2014-09-16 Remote Monitoring Systems, LLC Remote monitoring system for tanks
US20150207971A1 (en) * 2014-01-22 2015-07-23 Panasonic Intellectual Property Management Co., Ltd. Monitoring apparatus for controlling operation of shutter
US9594290B2 (en) * 2014-01-22 2017-03-14 Panasonic Intellectual Property Management Co., Ltd. Monitoring apparatus for controlling operation of shutter
CN104932284A (en) * 2014-02-06 2015-09-23 霍尼韦尔国际公司 Method and system of interacting with building security systems
WO2016095623A1 (en) * 2014-12-19 2016-06-23 小米科技有限责任公司 Method and apparatus for processing surveillance video
US10193875B2 (en) 2014-12-19 2019-01-29 Xiaomi Inc. Method and apparatus for controlling access to surveillance video
US9621702B2 (en) * 2015-06-03 2017-04-11 I-Ting Shen Control system cooperating with a mobile device
US9538380B2 (en) * 2015-06-03 2017-01-03 I-Ting Shen Control system cooperating with a mobile device and a management server
US9589404B2 (en) * 2015-06-05 2017-03-07 Ford Global Technologies, Llc Method and apparatus for remote vehicle keypad enablement and disablement
US9852562B2 (en) * 2015-07-06 2017-12-26 Acsys Ip Holding, Inc. Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons
US20170011573A1 (en) * 2015-07-06 2017-01-12 Acsys Ip Holding Inc. Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons
US9641510B2 (en) * 2015-09-11 2017-05-02 I-Ting Shen Control system operable by mobile devices
US20170078260A1 (en) * 2015-09-11 2017-03-16 I-Ting Shen Control System Operable by Mobile Devices
FR3043118A1 (en) * 2015-10-29 2017-05-05 K Line SYSTEM FOR STEERING A DOOR HAVING A CREMONE LOCK COMMANDABLE BY AN ELECTRIC ACTUATOR
US9754432B2 (en) * 2015-11-17 2017-09-05 International Business Machines Corporation Wireless communication protocol based lock management
WO2017172871A1 (en) * 2016-03-31 2017-10-05 Spectrum Brands, Inc. Locking device with multiple authentication devices
US11580803B2 (en) 2016-03-31 2023-02-14 Spectrum Brands, Inc. Locking device with multiple authentication devices
US20210343098A1 (en) * 2016-09-21 2021-11-04 Equipmentshare.Com Inc Method, system and apparatus for equipment monitoring and access control
US20210343096A1 (en) * 2016-09-21 2021-11-04 Equipmentshare.Com Inc Method, system and apparatus for equipment monitoring and access control
US11651640B2 (en) * 2016-09-21 2023-05-16 Equipmentshare.Com Inc Method, system and apparatus for equipment monitoring and access control
US11651637B2 (en) 2016-09-21 2023-05-16 Equipmentshare.Com Inc Method, system and apparatus for equipment monitoring and access control
US11651639B2 (en) * 2016-09-21 2023-05-16 Equipmentshare.Com Inc Method, system and apparatus for equipment monitoring and access control
US11651641B2 (en) * 2016-09-21 2023-05-16 Equipmentshare.Com Inc Method, system and apparatus for equipment monitoring and access control
US11823515B2 (en) * 2016-09-21 2023-11-21 Equipmentshare.Com Inc Method, system and apparatus for equipment monitoring and access control
US11079755B2 (en) 2019-04-05 2021-08-03 Equipmentshare.Com Inc. System and method for autonomous operation of a machine
US11127410B2 (en) * 2019-11-12 2021-09-21 Wen-Ta Chiu Voice decoding device and method thereof
US20220392285A1 (en) * 2021-06-08 2022-12-08 Carrier Corporation Monitoring items in an area accessible through an electronic locking device

Similar Documents

Publication Publication Date Title
US20070289012A1 (en) Remotely controllable security system
US9679455B2 (en) Security monitoring with programmable mapping
US10706703B1 (en) Service entrance alarm system and methods of using the same
US7741969B2 (en) Door entry security device with electronic lock
US8937539B2 (en) Method and apparatus for automatically disarming a security system
US20020099945A1 (en) Door access control and key management system and the method thereof
US20110001812A1 (en) Context-Aware Alarm System
JP6266184B1 (en) Monitoring system
TWM527479U (en) Intellectual entry system
US10748366B2 (en) Mobile-based access control system with wireless access controller
US20130155242A1 (en) Stand-Alone, Portable Video Alarm System
KR101091902B1 (en) Apparatus for real-time monitoring and robbery prevention and method thereof
JP2009108575A (en) Room entrance/exit control system
Gavaskar et al. A novel design and implementation of IoT based real-time ATM surveillance and security system
US20240105035A1 (en) Smart sensor device and early warning notification system and method
KR101523027B1 (en) Intrusion detection system using mobile terminal
US20240119769A1 (en) Multiple tamper detection techniques for secure access device
KR101942076B1 (en) Security system for stored items using contactless type tag
TWI599991B (en) Intelligent access control system
KR102437525B1 (en) Integrated system for blocking leakage of core technology information
KR101063751B1 (en) Biometrics-based Passenger Identification and Information Transmission System
KR100664648B1 (en) Clint terminal apparatus for security management system via internet
Shruthi et al. Locker Security System using Internet of Things
JP6919763B2 (en) Wireless communication device and entry / exit management system
KR100958432B1 (en) System and methodf for security management, storage medium recording that method program

Legal Events

Date Code Title Description
AS Assignment

Owner name: BLUEWAVE SECURITY, INC., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BIARD, LEEMON;REEL/FRAME:018203/0410

Effective date: 20060607

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION